Improving Tsa Security Process

Description of the OrganizationAirports have traditionally been some of the busiest hubs of people in the world. Thousands of people go through these hubs to get home, to work, or to vacation destinations. Hartsfield-Jackson Atlanta International Airport in Atlanta, Georgia is the single busiest airport in the United States. With 151 domestic, and 28 international gates, Hartsfield-Jackson has almost 45 million passengers traveling through its complex every year. For comparison, Boston’s Logan International Airport is the19th busiest airport in the country with approximately 14 million passengers passing through every year. Airports have many subunits which work together to move passengers to their final destination. These subunits are, but not limited to, ticket counters where customers purchase tickets and check-in, baggage drops and collection, aircraft ground services, runway operations, passenger waiting areas, airport gate operations, and perhaps most importantly, airport security.

Until approximately the 1960’s, airport security was not a major issue. Travelers could quickly move from the check-in counter to their flight with minimal baggage or body checks. Sharp objects, and even guns at one point, were routinely allowed onboard aircrafts – until increases in terrorism and aircraft hijackings led to new security measures. Decades later, the events of September 11, 2001 led to a completely new set of security restrictions, and as a result, now every traveler must pass through a long and arduous security process in order to board an aircraft. In fact, it has now become a rite of passage for a traveler to have a frustrating experience while traveling.

Today, the task of operating airport security is managed by the Transportation Security Administration (TSA), which is under the Department of Homeland Security. The TSA uses various forms of security measures to ensure passenger security. Some low-tech measures include verifying a person’s identity and checking for unnecessarily nervous passengers. They will even pat down a person’s clothes and manually search that person’s luggage. Additionally, the TSA also uses metal detectors, luggage x-ray machines, and full body scanners to a similar effect. All of these measures are to ensure that passengers do not bring contraband items that may compromise the security of the passengers onboard the aircraft, as well as the general population in the event of a hijacking.

Information about ConsumersThere are three major types of airline passengers which pass through airport security: business passengers, leisure passengers, and passengers with special needs. Business passengers travel frequently, have minimal carry-on luggage, and typically do not cause congestion. The average leisure traveler is one who travels occasionally, is familiar with the airport security process and passes through the security process in a reasonable amount of time. The special needs passenger is one who needs extra time to pass through security and board an aircraft – typically large families with small children, people with disabilities, or elderly people who move slowly.

Regardless of the type of person passing through security, each has a set of expectations during the process. They expect to move through the security line at a reasonable pace and want to avoid waiting in long lines. They expect to be treated professionally and courteously. They expect their belongings will be safe as they pass through the x-ray machine. Finally, there is an expectation that the security process works and does an adequate job to provide safety.

Objectives of the Security ProcessThere are two main objectives of the airport security process. The first is to ensure that the passengers are not carrying any dangerous items on board and that they are not an immediate threat to anyone else, including themselves. This is achieved by an ID verification and a thorough...

You May Also Find These Documents Helpful

...A Reference Security Management Plan
for Energy Infrastructure
Prepared by the Harnser Group for the European Commission
Summer 2010
Under Contract TREN/C1/185/2009
A Reference Security Management Plan for Energy Infrastructure
Foreword
The European Union is developing its policy on critical energy
infrastructures in relation to the European Programme for Critical
Infrastructure Protection (“EPCIP”) which considers measures that
will enhance, where necessary, the level of protection of certain
infrastructures against external threats.
The integrity of energy infrastructures and their reliable operation are key factors in ensuring
the supply in energy, vital for the well-being of the citizens and the functioning of the economy.
For this reason energy infrastructure is considered as a priority for the implementation of the
EPCIP, hence the policy adopted in December 2008, under Council Directive 2008/114/EC on
the identification and designation of European critical infrastructures and the need to improve
their protection, has the energy sector in its scope. As one of a number of requirements, this
Directive included the creation of an Operator Security Plan for all infrastructures designated
as European Critical.
The European Commission’s Directorate General for Energy tasked an external contractor to
prepare a non-binding Reference Security Management Plan. This is intended to be a useful...

...EH101
December 5, 2012
TSA: The Sexual Assault
On August 29, 2012, Ron Paul, his granddaughter and wife were subjected to harassment by TSA while they were in an airport in Tampa. According to Ron Paul, there were eight TSA agents who instructed Paul and his family to be screened before they leave because Mitt Romney may be nearby. After examining all of Paul’s items they demanded that they search the plane for any type of explosive. The incident eventually ended after Ron Paul’s wife, Carol, who has a pacemaker, refused to be screened by the TSA and an aide started taking video. After the tragic attack on the twin towers and the world trade center, Congress formed The Transportation Security Administration (TSA). The Transportation Security Administration consists of 50,000 security officers, inspectors, directors, air marshals, and managers who protect the nation's transportation systems. The Transportation Security Administration has proven that with its policy it has set invading people’s privacy as its number one priority for everyone that takes a flight from one place to another.
First and foremost, the TSA has sexually harassed individuals with their use of the full-body scanner. The full-body scanner is a device that scans and makes a picture of a person's body shape, in order to search for hidden objects without...

...﻿Case Study: Improving Recruitment Processes – Part 1 of 2
Rising attrition is a common problem across industries. Tight monthly, quarterly and annual objectives leave little room for error when it comes to having the required manpower being available consistently. Unwanted attrition results in two significant challenges for human resources (HR) teams. They must work to continuously:
1. Decrease cycle time to fill a job opening.
2. Decrease the effort required for a successful recruitment.
The case described here uses total quality management (TQM) to address these problems in a large, fast-moving consumer goods company in India. (Note: The details of the process have been condensed and modified for the sake of confidentiality and easy of storytelling.)
A two-day quality awareness program introduced the cross-functional project team members to TQM (including just-in-time [JIT], total quality control [TQC] and total employee involvement [TEI]). Fortnightly meetings then started to address the problem at hand through the seven steps of problem solving:
1. Define the problem
2. Research the causes
3. Generate countermeasure ideas
4. Test and modify the ideas
5. Implement ideas
6. Standardize procedures
7. Compile quality improvement story
The case study is described in two parts: 1) decreasing cycle time and 2) decreasing effort.
Step 1: Define the Problem
Following the recommend practice of TQM, the project team began by defining the beginning...

...Death to the TSA
The Transportation Security Administration, or TSA, was born in the turmoil following the horrible events of September 11. The logic behind its creation was that since contemporary airport security had failed to prevent the September 11 terrorist attacks, airport security needed to be redesigned. The result was a massive, nationalized, airport security force that costs the US government $7.6 billion each year and costs the American people some of their most basic rights. Ladies and Gentlemen of the US Congress, I come before you today to insist that the TSA be abolished and US Airports be permitted to return to privatized airport security. For the TSA has proven mutable times they are grossly incompetent at detecting security threats, actively disrespect and violate the rights of passengers, and privatize security forces have shown to be more both more efficient and less expensive.
I will now elaborate on my first point: that the TSA has been shown to be grossly incompetent at detecting security threats. Two years ago, in mid December, Farid Seif, a Houston businessman boarded his flight for a routine business trip to New York City. However after his plane touched down at Kennedy Airport he reached into his computer bag and realized he’d accidentally brought this loaded...

... Terror threats are always prevalent when leaving the comfort of one's own home. Relying on the enforcement of strict security measures to ensure the safety of passengers during air travel as threats of terror attacks are always present.
Ever since the terrorist attacks against the United States on September 11, 2001, airport security across America and much of the world had undergone many changes to their normal routines of simply checking their baggage prior to boarding the plane. There are now many other extra steps in place before getting anywhere even close to the gate. Travelers should be aware of the lengthy wait times, more scrutinizing of passenger passports, documentation, and luggage. For the frequent air travelers, this became an intense issue. Many travelers were complaining about the lengthy wait times and airport security checking and re-checking of luggage which became a normal part of their jobs. After 9/11, much of the nation demanded the use of stricter security measures than those that were in place. This was when the attacks were fresh and people had no complaints as long as the government was doing everything they could to keep passengers as safe as possible. The need for tighter security meant the higher demand of the use of more advanced technologies and receiving a much needed makeover of the procedures in security training that was in place even...

...Security Brutality
Before the year 2000 airports were smooth transportation services. People could enter an airport and basically walk right on to their planes without being hassled by airport security. Air travel safety precautions changed dramatically after the September 11, 2001, terrorist attacks that targeted passenger planes in the United States. After many years of upping security in airports, the Transportation Security Administration knew that metal detectors weren’t enough to pick up all dangerous weapons and explosives. In 2007, the Transportation Security Administration began distributing body scanners to use at security checkpoints in airports throughout the United States. Travelers were outraged when they were told the scanners could produce pictures that could see through their clothes. These scanners and new security procedures should not be allowed to be operational in the United States because they invade personal privacy and slow down the flow of travelers.
The fight against terrorist attacks and threats to American airlines is a losing battle. There are simply too many ways a weapon or plastic explosives can be concealed on the human body. TSA officers used to pat down passengers with the backs of their hands, but now they'll use the fronts of their hands to search more than ever before, in some cases touching body parts that once...

...These reserves are usually controlled by top management, the owner, and/or the project manager. Budget and management reserves are independent of each other.
6. How are the work breakdown structure and change control connected?
The WBS and change control are directly linked. Any change from the baseline developed from the WBS needs to be recorded. This link allows management to trace changes and problems directly to deliverables and the organization unit responsible.
7. What are the likely outcomes if a change control process is not used? Why?
If a change control process is not used, budgets and plans will self-destruct quickly. Tracking changes facilitates control and accountability of budgets and time. In addition, change control allows for coordination of changes further on in the project.
8. What are the major differences between managing negative risks versus positive risks (opportunities)?
Essentially the same process that is used to manage negative risks is applied to positive risks. The major differences occur in the responses. Instead of avoiding negative risks, project managers often try to exploit positive risks by taking action to ensure that the opportunity occurs. Instead of transferring risks to another party, project managers often share positive risks to increase the likelihood the opportunity can be exploited. Instead of mitigating negative risks, project managers will take action...

...Do international norms have an impact on security issues? Why?
Norms can be understood as rules for standard behaviour. Norms are a common belief or understanding usually shared by a majority. International norms are determined by the international community and they usually set the stage for the behaviour of individual countries. These norms shape international as well as domestic security issues. These norms shape inter-state behaviour, they also shape the security policies of nation-states and they also serve to set certain normative standards about how the world should be. In this paper we will look at how the emergence of certain norms, taboos and international laws have contributed to international security concerns and sometimes also problems of mistrust.
The major schools of international relations theory such as neoliberalism and neorealism have not satisfactorily confronted the evolution of norms of interstate behaviour. However the constructivist literature draws on a variety of theoretical texts and empirical studies to argue that norms have illustrative power independent of structural and situational constraints.
The belief that all norms are created by the powerful can be challenged. As international norms have come to be shaped by a number of factors such as newer democracies, pressure groups, international and humanitarian organizations. Humanitarian values, global security,...